Eicon Networks S92 Manual de usuario Pagina 23

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 22
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 23
VisNetic_1:
n FirewallprotectionforInternal_Servers,RAS_NetandCritical_Resources
n Platform:x86basedWindows2000ServerrunningDeerfieldVisNeticFirewall
n Hardware:SinglePentium3800MHZ,256MBRAM,20GBDiskMirror,four
100BaseTNICs.
ISA_Cache:
n Proxycachingandfirewallprotectionforoutgoinginternettrafficfrom
Internal_Clients,Internal_AdminandInternal_Dev.
n Platform:x86basedWindows2000ServerrunningMicrosoftISAServer
StandardEdition
n Hardware:SinglePentium41GHZ,256MBRAM,50GBDiskMirror,two
100BaseTNICs.
W2K_VPN:
n VPNGatewayservicinginboundVPNconnectionrequestsfromtheexternal
partnersandsuppliers
Whydowedividetheentireuserbaseintothreedifferentgroupswitheach
ofthemunder theprotectionofdifferentfirewalls?
Theans wertothisquestionis:weneedtoachieveseparationofbusiness
functions:
q Theadministratorspossessall themightyprivilegesand toolsfor
manipulatingtheentirenetwork.Itwillbeadisasteriftheirsystemsare
compromisedeitherbydisgruntledemployeesorbyexternalhackers.
q Thedeveloperspossessallthecodesandtechnologysecretsf or the
ecommerceapplications.Itwillbeadisasterifthisinformationis
compromised. Again,disgruntledemployeesandexternalhackersarethe
potentialsourcesofsuchthreat.
q Theclientsusuallymakeunintentional(andproperly intentionalyet
amateur)troubles.Thesetroublesarebettertobecontainedwithintheir
ownsegment.
Vista de pagina 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 208 209

Comentarios a estos manuales

Sin comentarios